This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Point-To-Point Protocol Project First view 2006-07-05
Product Point-To-Point Protocol Last view 2020-02-03
Version - Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:point-to-point_protocol_project:point-to-point_protocol

Activity : Overall

Related : CVE

  Date Alert Description
9.8 2020-02-03 CVE-2020-8597

eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions.

9.8 2018-06-14 CVE-2018-11574

Improper input validation together with an integer overflow in the EAP-TLS protocol implementation in PPPD may cause a crash, information disclosure, or authentication bypass. This implementation is distributed as a patch for PPPD 0.91, and includes the affected eap.c and eap-tls.c files. Configurations that use the `refuse-app` option are unaffected.

4.3 2015-04-24 CVE-2015-3310

Buffer overflow in the rc_mksid function in plugins/radius/util.c in Paul's PPP Package (ppp) 2.4.6 and earlier, when the PID for pppd is greater than 65535, allows remote attackers to cause a denial of service (crash) via a start accounting message to the RADIUS server.

7.5 2014-11-15 CVE-2014-3158

Integer overflow in the getword function in options.c in pppd in Paul's PPP Package (ppp) before 2.4.7 allows attackers to "access privileged options" via a long word in an options file, which triggers a heap-based buffer overflow that "[corrupts] security-relevant variables."

7.2 2006-07-05 CVE-2006-2194

The winbind plugin in pppd for ppp 2.4.4 and earlier does not check the return code from the setuid function call, which might allow local users to gain privileges by causing setuid to fail, such as exceeding PAM limits for the maximum number of user processes, which prevents the winbind NTLM authentication helper from dropping privileges.

CWE : Common Weakness Enumeration

%idName
40% (2) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
20% (1) CWE-190 Integer Overflow or Wraparound
20% (1) CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflo...
20% (1) CWE-20 Improper Input Validation

Open Source Vulnerability Database (OSVDB)

id Description
26994 ppp Winbind Plugin setuid Failure Local Privilege Escalation

OpenVAS Exploits

id Description
2008-01-17 Name : Debian Security Advisory DSA 1106-1 (ppp)
File : nvt/deb_1106_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 1150-1 (shadow)
File : nvt/deb_1150_1.nasl

Nessus® Vulnerability Scanner

id Description
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-aed26fc705.nasl - Type: ACT_GATHER_INFO
2018-06-29 Name: The remote Fedora host is missing a security update.
File: fedora_2018-b99d43ee9b.nasl - Type: ACT_GATHER_INFO
2017-02-16 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2017-0474-1.nasl - Type: ACT_GATHER_INFO
2017-02-16 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2017-0473-1.nasl - Type: ACT_GATHER_INFO
2017-01-23 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201701-50.nasl - Type: ACT_GATHER_INFO
2015-11-30 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2015-827.nasl - Type: ACT_GATHER_INFO
2015-05-06 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-2595-1.nasl - Type: ACT_GATHER_INFO
2015-05-05 Name: The remote Mandriva Linux host is missing one or more security updates.
File: mandriva_MDVSA-2015-222.nasl - Type: ACT_GATHER_INFO
2015-04-22 Name: The remote Slackware host is missing a security update.
File: Slackware_SSA_2015-111-11.nasl - Type: ACT_GATHER_INFO
2015-04-20 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3228.nasl - Type: ACT_GATHER_INFO
2015-04-20 Name: The remote Debian host is missing a security update.
File: debian_DLA-205.nasl - Type: ACT_GATHER_INFO
2015-03-30 Name: The remote Mandriva Linux host is missing one or more security updates.
File: mandriva_MDVSA-2015-135.nasl - Type: ACT_GATHER_INFO
2015-03-26 Name: The remote Debian host is missing a security update.
File: debian_DLA-74.nasl - Type: ACT_GATHER_INFO
2014-12-15 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201412-19.nasl - Type: ACT_GATHER_INFO
2014-12-02 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-2429-1.nasl - Type: ACT_GATHER_INFO
2014-12-01 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3079.nasl - Type: ACT_GATHER_INFO
2014-09-17 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2014-545.nasl - Type: ACT_GATHER_INFO
2014-09-12 Name: The remote Mandriva Linux host is missing one or more security updates.
File: mandriva_MDVSA-2014-178.nasl - Type: ACT_GATHER_INFO
2014-09-04 Name: The remote SuSE 11 host is missing a security update.
File: suse_11_ppp-140826.nasl - Type: ACT_GATHER_INFO
2014-08-30 Name: The remote Fedora host is missing a security update.
File: fedora_2014-9401.nasl - Type: ACT_GATHER_INFO
2014-08-23 Name: The remote Fedora host is missing a security update.
File: fedora_2014-9412.nasl - Type: ACT_GATHER_INFO
2007-11-10 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-310-1.nasl - Type: ACT_GATHER_INFO
2006-10-14 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-1106.nasl - Type: ACT_GATHER_INFO
2006-07-11 Name: The remote Mandrake Linux host is missing one or more security updates.
File: mandrake_MDKSA-2006-119.nasl - Type: ACT_GATHER_INFO